| Clue | Answer | % Correct |
|---|---|---|
| Computers and Humans can get these: V | Virus | 98%
|
| General term covering different types of threats: M | Malware | 90%
|
| 4 digit common password: | 1234 | 82%
|
| Protect your computer with a wall: | Firewall | 82%
|
| Setting up an account you need this: P | Password | 82%
|
| Computer program that replicates itself in order to spread: W | Worm | 80%
|
| Emails tricking people into giving away personal information: P | Phishing | 79%
|
| Ensure your software is ? which will include the latest security patches: U | Updated | 73%
|
| DDOS stands for: | Distributed Denial of Service | 70%
|
| Attack that works by constantly trying to access account: B F | Brute force | 63%
|
| Sneaking in without being noticed, disguised as legitimate software: T | Trojan Horse | 61%
|
| To make plain text unreadable: E | Encryption | 60%
|
| Don't lose this or you will lose your data. Don’t use a computer when someone else's device is plugged in: Removable D? | Drive | 56%
|
| Slow at processing data and prone to mistakes but creative and great at problem solving (Unlike a computer) | Human | 52%
|
| Crime that is up 107% since 2015: C A | Cyber Attack | 36%
|
| To protect you from malware you might install...A | Anti malware | 34%
|
| Attempt to make an online service unavailable: D | DDOS | 26%
|
| Generic document outlining rules for network access: N P | Network Policy | 16%
|
| Manage user access: U, A, L | User access levels | 9%
|
| Stealing computer-based information from an unknowing victim: D I | Data Interception | 5%
|